[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[cobalt-users] [raq4] how does this look to you - raq4 sudden crashes, kernel log
- Subject: [cobalt-users] [raq4] how does this look to you - raq4 sudden crashes, kernel log
- From: Csaba Albert <maka_cs@xxxxxxxxx>
- Date: Wed Oct 15 04:48:04 2003
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
Hi,
today this raq4 server crashed 5 times in an hour.
Judging from this log, it has some serious problems...
it did'nt even got to start and already has kernel
errors??
a sad sysadmin,
Csaba
Oct 15 11:30:04 ns kernel: Adding Swap: 131532k
swap-space (priority -1)
Oct 15 11:30:04 ns kernel: Sun Cobalt Bandwidth
Limiting Module
Oct 15 11:30:04 ns kernel: Copyright (c) 1999-2001,
Sun Microsystems, Inc.
Oct 15 11:30:04 ns kernel: All rights reserved
Oct 15 11:30:04 ns kernel: eth0: Invalid EEPROM
checksum 0xefd5, check settings before activating this
device!
Oct 15 11:30:04 ns kernel: eth0: Intel PCI
EtherExpress Pro100 82559ER, 00:10:E0:01:F5:DD, I/O at
0x6200, IRQ 11.
Oct 15 11:30:04 ns kernel: Board assembly 000000-000,
Physical connectors present:
Oct 15 11:30:04 ns kernel: Primary interface chip None
PHY #0.
Oct 15 11:30:04 ns kernel: Forcing 100Mbs full-duplex
operation.
Oct 15 11:30:04 ns kernel: General self-test: passed.
Oct 15 11:30:04 ns kernel: Serial sub-system
self-test: passed.
Oct 15 11:30:04 ns kernel: Internal registers
self-test: passed.
Oct 15 11:30:04 ns kernel: ROM checksum self-test:
passed (0xdbd8681d).
Oct 15 11:30:04 ns kernel: Receiver lock-up workaround
activated.
Oct 15 11:30:04 ns kernel: eth1: Invalid EEPROM
checksum 0xead7, check settings before activating this
device!
Oct 15 11:30:04 ns kernel: eth1: Intel PCI
EtherExpress Pro100 82559ER, 00:10:E0:01:F7:D8, I/O at
0x6240, IRQ 10.
Oct 15 11:30:04 ns kernel: Board assembly 000000-000,
Physical connectors present:
Oct 15 11:30:04 ns kernel: Primary interface chip None
PHY #0.
Oct 15 11:30:04 ns kernel: General self-test: passed.
Oct 15 11:30:04 ns kernel: Serial sub-system
self-test: passed.
Oct 15 11:30:04 ns kernel: Internal registers
self-test: passed.
Oct 15 11:30:04 ns kernel: ROM checksum self-test:
passed (0xdbd8681d).
Oct 15 11:30:04 ns kernel: Receiver lock-up workaround
activated.
Oct 15 11:30:04 ns kernel: portmap: RPC call returned
error 111
Oct 15 11:30:04 ns kernel: RPC: task of released
request still queued!
Oct 15 11:30:04 ns kernel: RPC: (task is on
xprt_pending)
Oct 15 11:30:04 ns kernel: portmap: RPC call returned
error 111
Oct 15 11:30:04 ns kernel: RPC: task of released
request still queued!
Oct 15 11:30:04 ns kernel: RPC: (task is on
xprt_pending)
Oct 15 11:30:04 ns kernel: lockd_up: makesock failed,
error=-111
Oct 15 11:30:04 ns kernel: portmap: RPC call returned
error 111
Oct 15 11:30:04 ns kernel: RPC: task of released
request still queued!
Oct 15 11:30:04 ns kernel: RPC: (task is on
xprt_pending)
Oct 15 11:30:11 ns kernel: general protection fault:
8550
Oct 15 11:30:11 ns kernel: CPU: 0
Oct 15 11:30:11 ns kernel: EIP:
0010:[generic_readpage+14/144]
Oct 15 11:30:11 ns kernel: EFLAGS: 00010282
Oct 15 11:30:11 ns kernel: eax: c29d0be0 ebx: c030ea20
ecx: c255f060 edx: c02a2000
Oct 15 11:30:11 ns kernel: esi: c2668550 edi: c2b74000
ebp: 000e0000 esp: df7c3b30
Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
Oct 15 11:30:11 ns kernel: Process httpd (pid: 510,
process nr: 11, stackpage=df7c3000)
Oct 15 11:30:11 ns kernel: Stack: c2b74000 000e0000
c2668550 00000000 000e0000 dfe70520 df7c2000 00000001
Oct 15 11:30:11 ns kernel: df80d04c c2c18000 00000000
c011c914 c255f060 c030ea20 00000010 000e0000
Oct 15 11:30:11 ns kernel: 00000000 000e2000 dfe9a4d4
c011d53c c255f060 000e0000 00000000 db6a0380
Oct 15 11:30:11 ns kernel: Call Trace:
[try_to_read_ahead+248/272] [filemap_nopage+416/816]
[do_no_page+81/196] [handle_mm_fault+197/324]
[do_page_fault+278/944] [error_code+45/56]
[clear_user+55/72]
Oct 15 11:30:11 ns kernel: [padzero+28/32]
[load_elf_binary+3222/3552] [cprt+1788/55552]
[read_exec+194/316] [search_binary_handler+71/288]
[do_execve+422/564] [do_execve+456/564]
[sys_execve+47/88]
Oct 15 11:30:11 ns kernel: [system_call+52/56]
Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
Oct 15 11:30:11 ns kernel: general protection fault:
1650
Oct 15 11:30:11 ns kernel: CPU: 0
Oct 15 11:30:11 ns kernel: EIP:
0010:[generic_readpage+14/144]
Oct 15 11:30:11 ns kernel: EFLAGS: 00010282
Oct 15 11:30:11 ns kernel: eax: c29d0e60 ebx: 00000000
ecx: c23325c0 edx: c02a2000
Oct 15 11:30:11 ns kernel: esi: c25d1650 edi: c0311310
ebp: 00000000 esp: df975efc
Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
Oct 15 11:30:11 ns kernel: Process egrep (pid: 512,
process nr: 7, stackpage=df975000)
Oct 15 11:30:11 ns kernel: Stack: c0311310 00000000
00000000 00000000 00000000 00000001 df974000 dfe70ce0
Oct 15 11:30:11 ns kernel: df974000 00000000 00000000
c011cf1a c23325c0 c0311310 00008000 08061000
Oct 15 11:30:11 ns kernel: 00000000 00008000 dfef4594
00000000 00000000 1f9bb025 c23325c0 00000000
Oct 15 11:30:11 ns kernel: Call Trace:
[do_generic_file_read+1314/1500]
[generic_file_read+99/124] [file_read_actor+0/80]
[sys_read+174/196] [system_call+52/56]
Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
Oct 15 11:30:11 ns kernel: general protection fault:
5da4
Oct 15 11:30:11 ns kernel: CPU: 0
Oct 15 11:30:11 ns kernel: EIP:
0010:[generic_readpage+14/144]
Oct 15 11:30:11 ns kernel: EFLAGS: 00010286
Oct 15 11:30:11 ns kernel: eax: c29d0e60 ebx: 00000000
ecx: c25d1650 edx: c0311310
Oct 15 11:30:11 ns kernel: esi: df975da4 edi: c0311310
ebp: 00000000 esp: df975cdc
Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
Oct 15 11:30:11 ns kernel: Process rc (pid: 513,
process nr: 7, stackpage=df975000)
Oct 15 11:30:11 ns kernel: Stack: c0311310 00000000
464c457f 00010101 00000080 df975d6c dffe9650 df8d4140
Oct 15 11:30:11 ns kernel: df8d4140 df8d4140 c011ce39
c011cf42 df975da4 c0311310 00000080 df975e60
Oct 15 11:30:11 ns kernel: 00000000 df975da4 dfef4594
00000000 00000000 00000000 c017b3eb dfff8260
Oct 15 11:30:11 ns kernel: Call Trace:
[do_generic_file_read+1089/1500]
[do_generic_file_read+1354/1500]
[ip_route_input_slow+351/1220]
[generic_file_read+99/124] [file_read_actor+0/80]
[read_exec+194/316] [prepare_binprm+686/700]
Oct 15 11:30:11 ns kernel: [do_execve+309/564]
[sys_execve+47/88] [system_call+52/56]
Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
Oct 15 11:30:11 ns kernel: general protection fault:
1430
Oct 15 11:30:11 ns kernel: CPU: 0
Oct 15 11:30:11 ns kernel: EIP:
0010:[generic_readpage+14/144]
Oct 15 11:30:11 ns kernel: EFLAGS: 00010282
Oct 15 11:30:11 ns kernel: eax: c1b54040 ebx: 00000000
ecx: dfe7ff20 edx: c02a2000
Oct 15 11:30:11 ns kernel: esi: c25d1430 edi: c030a358
ebp: 00000000 esp: df975efc
Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
Oct 15 11:30:11 ns kernel: Process egrep (pid: 514,
process nr: 7, stackpage=df975000)
Oct 15 11:30:11 ns kernel: Stack: c030a358 00000000
00000000 00000000 00000000 00000001 df974000 dfe706a0
Oct 15 11:30:11 ns kernel: df974000 00000000 00000000
c011cf1a dfe7ff20 c030a358 00008000 08061000
Oct 15 11:30:11 ns kernel: 00000000 00008000 dfef450c
00000000 00000000 1f9bb025 dfe7ff20 00000000
Oct 15 11:30:11 ns kernel: Call Trace:
[do_generic_file_read+1314/1500]
[generic_file_read+99/124] [file_read_actor+0/80]
[sys_read+174/196] [system_call+52/56]
Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
Oct 15 11:30:12 ns kernel: general protection fault:
5da4
Oct 15 11:30:12 ns kernel: CPU: 0
Oct 15 11:30:12 ns kernel: EIP:
0010:[generic_readpage+14/144]
Oct 15 11:30:12 ns kernel: EFLAGS: 00010286
Oct 15 11:30:12 ns kernel: eax: c1b54040 ebx: 00000000
ecx: c25d1430 edx: c030a358
Oct 15 11:30:12 ns kernel: esi: df975da4 edi: c030a358
ebp: 00000000 esp: df975cdc
Oct 15 11:30:12 ns kernel: ds: 0018 es: 0018 ss: 0018
Oct 15 11:30:12 ns kernel: Process rc (pid: 515,
process nr: 7, stackpage=df975000)
Oct 15 11:30:12 ns kernel: Stack: c030a358 00000000
464c457f 00010101 00000080 df975d6c dffe9650 df8d4140
Oct 15 11:30:12 ns kernel: df8d4140 df8d4140 c011ce39
c011cf42 df975da4 c030a358 00000080 df975e60
Oct 15 11:30:12 ns kernel: 00000000 df975da4 dfef450c
00000000 00000000 c01cab9c 00000003 0000000c
Oct 15 11:30:12 ns kernel: Call Trace:
[do_generic_file_read+1089/1500]
[do_generic_file_read+1354/1500]
[add_timer_randomness+552/560]
[generic_file_read+99/124] [file_read_actor+0/80]
[read_exec+194/316] [prepare_binprm+686/700]
Oct 15 11:30:12 ns kernel: [do_execve+309/564]
[sys_execve+47/88] [system_call+52/56]
Oct 15 11:30:12 ns kernel: Code: cb 54 24 3c 8b 68 08
ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
Oct 15 11:58:59 ns kernel: klogd 1.3-3, log source =
/proc/kmsg started.
Oct 15 11:58:59 ns kernel: Inspecting /boot/System.map
Oct 15 11:58:59 ns kernel: Loaded 7678 symbols from
/boot/System.map.
Oct 15 11:58:59 ns kernel: Symbols match kernel
version 2.2.16.
Oct 15 11:58:59 ns kernel: Loaded 124 symbols from 2
modules.
Oct 15 11:58:59 ns kernel: Linux version 2.2.16C37_III
__________________________________
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com